String Interpolation in Slick Raw SQL
Request data is directly interpolated into Slick sql"..." queries without parameter binding.
SQL injection vulnerability where user-controlled input is interpolated or concatenated into raw Slick SQL (sql"..." or overrideSql) without safe parameter binding or proper handling of identifiers, potentially allowing attackers to expose or modify database data, run unauthorized queries, and compromise application integrity and confidentiality.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Request data is directly interpolated into Slick sql"..." queries without parameter binding.
Sourcery automatically identifies sql injection from request data in slick sql string in play and many other security issues in your codebase.